Recognizing and Predicting Context by Learning from User Behavior
|
|
- Rudolf Horn
- 6 years ago
- Views:
Transcription
1 Recognizing and Predicting Context by Learning from User Behavior 15. September 2003, Jakarta Institut für Praktische Informatik Johannes Kepler Universität Linz, Austria < 1 >
2 Vision A Personal Digital Assistant that can live up to its name. < 2 >
3 Mission Problem: Most information appliances are difficult to use for non-technology-savy users Devices only react to user input Users have to adapt to the devices Aim: Make information appliances smarter in a sense that they are easier to use Devices should be proactive Devices should adapt to the user < 3 >
4 Approach Personal information appliances should learn from user s habits Exploiting multiple sensors for context awareness Predicting future user context by learning from the past information appliance sensors (low level data) current user context user habits high level context information application future user context < 4 >
5 Content Introduction Context awareness Proactivity Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 5 >
6 Context awareness Many definitions for context, e.g. by Dey as any information that can be used to characterize the situation of an entity, where an entity can be a person, place or a physical or computational object Context has many aspects Using multiple simple sensors seems more reasonable to capture different aspects of context < 6 >
7 Proactivity < 7 >
8 Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 8 >
9 Architecture S 1 Feature extraction Classification Labeling Meeting n t Sensors S 2 S 3 C 1 C 2 At desk m t+ C m C k / P k S l Prediction <s 1, s 2,..., s l > t <f 1, f 2,..., f n > t <c 1, c 2,..., c m > t <c 1, c 2,..., c m > t+ Input vector (Sensor vector) Feature vector Class vector Future class vector < 9 >
10 Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 10 >
11 Sensors for (mobile) information appliances Typical sensors available for monitoring the user context: Time Application/Window manager Brightness Microphone Bluetooth Wireless LAN Docked / undocked Other suitable sensors can be connected: GPS GSM Compass Accelerometer Tilt sensor Temperature sensor Pressure sensor Sharing of sensor data between appliances < 11 >
12 Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction < 12 >
13 Feature Extraction Raw sensor data is transformed into more meaningful features Feature extraction exploits domain-specific knowledge Multiple features extracted from a single sensor High-dimensional input vectors Different types of features: Numerical (continuous) sensors: e.g. brightness sensor Numerical (discrete) sensors: e.g. number of access points in range Ordinal sensors: e.g. day of week Nominal sensors: e.g. WLAN-SSID, list of Bluetooth devices in spatial proximity Only two operations necessary for each feature: Distance metric Adaptation operator < 13 >
14 Feature extraction on a current PDA With current computational power easily possible Every feature implements distance metric and adaptation operator On-line classifications possible with any combination of features (user-selectable and loaded dynamically during startup) < 15 >
15 Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 16 >
16 Classification: Introduction Classifies feature vectors and finds common patterns in sensor data Different types of classification algorithms Type (partitioning / hierarchical) Soft / hard classification Supervised / unsupervised Requirements for classifying user context in information appliances: On-line learning Adaptivity Variable number of classes and variable topology Soft classification Noise resistance Limited resources Simplicity Interpretability of classes / protection of data privacy < 17 >
17 Classification: Algorithms Algorithm Network topology Topology preserving Competitive SOM fixed yes soft RSOM fixed yes soft K-Means fixed no hard Leader variable no hard Growing K-Means variable no hard Neural Gas variable no soft Neural Gas + Competitive Hebbian Learning variable yes soft Growing Neural Gas variable yes soft Incremental DBSCAN variable No hard < 18 >
18 Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 20 >
19 Assigning user-defined labels to user context t t t 1:{0,1} assignment of (meta-) clusters to context names Two possibilities: If the (meta-) clusters at the output of the classification step are stable, direct assignment to names If the (meta-) clusters are unstable due to learning and adaptation, use a second, simple classification step [van Laerhoven, 2001] ID 1 = at work ID 2 = meeting ID 3 = lunch ID 4 = ID 5 = at home < 21 >
20 Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 22 >
21 Prediction of User Context Recognized context classes can be regarded as states of an abstract state machine Monitoring the state trajectory allows to predict future states Prediction algorithm requirements for predicting context states : Unsupervised model estimation On-line learning Incremental model growing Confidence estimation Automatic feedback Manual feedback Long-term vs. short-term Architecture allows prediction algorithms to be realized as plug-ins Algorithms can be changed according to the specific application needs < 23 >
22 Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 24 >
23 First Results Test data gathered over 10 days for a selection of features: Timestamp Bluetooth: list of MAC addresses in spatial proximity Bluetooth: number of peers in spatial proximity Wireless LAN: list of MAC addresses in spatial proximity (clients associated to a nearby access point) Currently active application Distance metrics and adaptation operators implemented in straight-forward ways (e.g. Hamming distance for lists of MAC addresses) Implementation of Lifelong Growing Neural Gas (LLGNG) as classification algorithm < 25 >
24 First Results One-pass (online) run through the log file yields (multiple test runs): ~ 40 clusters ~ 6 meta-clusters < 0.12 overall classification error (average distance of input data points to cluster centers) < 26 >
25 Summary Architecture allows recognition and prediction of user context from raw sensor data in an un-supervised, non-obtrusive way in 4 steps: Feature extraction Classification Labeling Prediction Simple interfaces between the architecture layers Multiple, simple sensors instead of a single, complex one Heterogeneous feature vector handled via specific implementation of: distance metric adaptation operator for each feature First implementations of feature extraction and classification show promising results < 27 >
26 Conclusions and Future Outlook Proactive applications could allow the development of more intuitive user interfaces A Personal Digital Assistant and information appliances in general should become proactive to achieve a wider acceptance Context awareness is one possibility to achieve proactivity in applications Learning user behavior allows to predict future user context and thus future user actions Future research on non-obtrusive user interfaces for labeling user context necessary Qualitative comparison of prediction methods will be performed using realworld data < 28 >
27 It is hard to predict, especially the future Neils Bohr Winner of a Nobel Prize for physics < 29 >
28 The best way to predict the future is to invent it. Alan Kay Inventor of Smalltalk < 30 >
29 Thank you for your attention! < 31 >
Feature Extraction in Wireless Personal and Local Area Networks
Feature Extraction in Wireless Personal and Local Area Networks 29. October 2003, Singapore Institut für Praktische Informatik Johannes Kepler Universität Linz, Austria rene@soft.uni-linz.ac.at < 1 > Content
More informationContext prediction based on learning user habits: A next step towards "smart" systems
Context prediction based on learning user habits: A next step towards "smart" systems 31. January 2006, Helsinki Guest lecture 1 Computing Department Lancaster University, UK rene@comp.lancs.ac.uk < 1
More informationExtending the Growing Neural Gas Classifier for Context Recognition
Extending the Classifier for Context Recognition Eurocast 2007, Workshop on Heuristic Problem Solving, Paper #9.24 14. February 2007, 10:30 Rene Mayrhofer Lancaster University, UK Johannes Kepler University
More informationExtending the Growing Neural Gas Classifier for Context Recognition
Extending the Growing Neural Gas Classifier for Context Recognition Rene Mayrhofer 1 and Harald Radi 2 1 Lancaster University, Infolab21, South Drive, Lancaster, LA1 4WA, UK rene@comp.lancs.ac.uk 2 Tumpenweg
More informationMOBILE COMPUTING 2/14/17. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.
MOBILE COMPUTING CSE 40814/60814 Spring 2017 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment
More informationMOBILE COMPUTING 2/11/18. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.
MOBILE COMPUTING CSE 40814/60814 Spring 2018 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment
More informationGENERATING HIGH LEVEL CONTEXT FROM SENSOR DATA FOR MOBILE APPLICATIONS
GENERATING HIGH LEVEL CONTEXT FROM SENSOR DATA FOR MOBILE APPLICATIONS Wolfgang Woerndl 1, Christian Schueller 2, Thomas Rottach 1,2 1 Technische Universitaet Muenchen, Institut fuer Informatik Boltzmannstr.
More informationMachine Learning (CSMML16) (Autumn term, ) Xia Hong
Machine Learning (CSMML16) (Autumn term, 28-29) Xia Hong 1 Useful books: 1. C. M. Bishop: Pattern Recognition and Machine Learning (2007) Springer. 2. S. Haykin: Neural Networks (1999) Prentice Hall. 3.
More informationCluster Analysis. Mu-Chun Su. Department of Computer Science and Information Engineering National Central University 2003/3/11 1
Cluster Analysis Mu-Chun Su Department of Computer Science and Information Engineering National Central University 2003/3/11 1 Introduction Cluster analysis is the formal study of algorithms and methods
More informationExploratory Data Analysis using Self-Organizing Maps. Madhumanti Ray
Exploratory Data Analysis using Self-Organizing Maps Madhumanti Ray Content Introduction Data Analysis methods Self-Organizing Maps Conclusion Visualization of high-dimensional data items Exploratory data
More informationContext-Aware Systems. Michael Maynord Feb. 24, 2014
Context-Aware Systems Michael Maynord Feb. 24, 2014 The precise definition of 'context' is contentious. Here we will be using 'context' as any information that can be used to characterize the situation
More informationData mining fundamentals
Data mining fundamentals Elena Baralis Politecnico di Torino Data analysis Most companies own huge bases containing operational textual documents experiment results These bases are a potential source of
More information9/27/15 MOBILE COMPUTING. CSE 40814/60814 Fall System Structure. explicit output. explicit input
MOBILE COMPUTING CSE 40814/60814 Fall 2015 System Structure explicit input explicit output 1 Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment
More informationA SURVEY OF IMAGE MINING TECHNIQUES AND APPLICATIONS
A SURVEY OF IMAGE MINING TECHNIQUES AND APPLICATIONS R. Vijayalatha Research Scholar, Manonmaniam Sundaranar University, Tirunelveli (India) ABSTRACT In the area of Data Mining, Image Mining technology
More informationRandom Forest A. Fornaser
Random Forest A. Fornaser alberto.fornaser@unitn.it Sources Lecture 15: decision trees, information theory and random forests, Dr. Richard E. Turner Trees and Random Forests, Adele Cutler, Utah State University
More informationPolicy-Based Context-Management for Mobile Solutions
Policy-Based Context-Management for Mobile Solutions Caroline Funk 1,Björn Schiemann 2 1 Ludwig-Maximilians-Universität München Oettingenstraße 67, 80538 München caroline.funk@nm.ifi.lmu.de 2 Siemens AG,
More informationD B M G Data Base and Data Mining Group of Politecnico di Torino
DataBase and Data Mining Group of Data mining fundamentals Data Base and Data Mining Group of Data analysis Most companies own huge databases containing operational data textual documents experiment results
More informationHomework # 4. Example: Age in years. Answer: Discrete, quantitative, ratio. a) Year that an event happened, e.g., 1917, 1950, 2000.
Homework # 4 1. Attribute Types Classify the following attributes as binary, discrete, or continuous. Further classify the attributes as qualitative (nominal or ordinal) or quantitative (interval or ratio).
More informationMachine Learning : Clustering, Self-Organizing Maps
Machine Learning Clustering, Self-Organizing Maps 12/12/2013 Machine Learning : Clustering, Self-Organizing Maps Clustering The task: partition a set of objects into meaningful subsets (clusters). The
More informationCooperative Communications and Wireless Body Area Networks. Xigang Huang
Cooperative Communications and Wireless Body Area Networks Xigang Huang Contents Wireless Body Area Networks Applications Network architecture of WBANs MAC and Route Protocols Interworking Cooperative
More informationSlide07 Haykin Chapter 9: Self-Organizing Maps
Slide07 Haykin Chapter 9: Self-Organizing Maps CPSC 636-600 Instructor: Yoonsuck Choe Spring 2012 Introduction Self-organizing maps (SOM) is based on competitive learning, where output neurons compete
More informationINTRODUCTION TO DATA MINING
INTRODUCTION TO DATA MINING 1 Chiara Renso KDDLab - ISTI CNR, Italy http://www-kdd.isti.cnr.it email: chiara.renso@isti.cnr.it Knowledge Discovery and Data Mining Laboratory, ISTI National Research Council,
More informationMusic Similarity Clustering
Cognitive Science B.Sc. Program University of Osnabrück, Germany Music Similarity Clustering A Content-Based Approach in Clustering Music Files According to User Preference Thesis-Project for the Degree
More informationA Survey of Context-Aware Mobile Computing Research
A Survey of Context-Aware Mobile Computing Research Guanling Chen and David Kotz 2005.11. 14 Cho Jaekyu jkcho@mmlab.snu.ac.kr Contents 1 2 3 4 5 6 7 8 Introduction Definition of Context Context-Aware Computing
More informationInput: Concepts, Instances, Attributes
Input: Concepts, Instances, Attributes 1 Terminology Components of the input: Concepts: kinds of things that can be learned aim: intelligible and operational concept description Instances: the individual,
More informationCHAPTER 4: CLUSTER ANALYSIS
CHAPTER 4: CLUSTER ANALYSIS WHAT IS CLUSTER ANALYSIS? A cluster is a collection of data-objects similar to one another within the same group & dissimilar to the objects in other groups. Cluster analysis
More informationDI TRANSFORM. The regressive analyses. identify relationships
July 2, 2015 DI TRANSFORM MVstats TM Algorithm Overview Summary The DI Transform Multivariate Statistics (MVstats TM ) package includes five algorithm options that operate on most types of geologic, geophysical,
More information2. Basic Task of Pattern Classification
2. Basic Task of Pattern Classification Definition of the Task Informal Definition: Telling things apart 3 Definition: http://www.webopedia.com/term/p/pattern_recognition.html pattern recognition Last
More informationChapter DM:II. II. Cluster Analysis
Chapter DM:II II. Cluster Analysis Cluster Analysis Basics Hierarchical Cluster Analysis Iterative Cluster Analysis Density-Based Cluster Analysis Cluster Evaluation Constrained Cluster Analysis DM:II-1
More informationChapter 7: Competitive learning, clustering, and self-organizing maps
Chapter 7: Competitive learning, clustering, and self-organizing maps António R. C. Paiva EEL 6814 Spring 2008 Outline Competitive learning Clustering Self-Organizing Maps What is competition in neural
More informationCogniSight, image recognition engine
CogniSight, image recognition engine Making sense of video and images Generating insights, meta data and decision Applications 2 Inspect, Sort Identify, Track Detect, Count Search, Tag Match, Compare Find,
More informationData Sources for Cyber Security Research
Data Sources for Cyber Security Research Melissa Turcotte mturcotte@lanl.gov Advanced Research in Cyber Systems, Los Alamos National Laboratory 14 June 2018 Background Advanced Research in Cyber Systems,
More informationContext Aware Computing
CPET 565/CPET 499 Mobile Computing Systems Context Aware Computing Lecture 7 Paul I-Hai Lin, Professor Electrical and Computer Engineering Technology Purdue University Fort Wayne Campus 1 Context-Aware
More informationCS513-Data Mining. Lecture 2: Understanding the Data. Waheed Noor
CS513-Data Mining Lecture 2: Understanding the Data Waheed Noor Computer Science and Information Technology, University of Balochistan, Quetta, Pakistan Waheed Noor (CS&IT, UoB, Quetta) CS513-Data Mining
More informationUnsupervised Learning
Networks for Pattern Recognition, 2014 Networks for Single Linkage K-Means Soft DBSCAN PCA Networks for Kohonen Maps Linear Vector Quantization Networks for Problems/Approaches in Machine Learning Supervised
More informationOverview. Background. Intelligence at the Edge. Learning at the Edge: Challenges and Brainstorming. Amazon Alexa Smart Home!
Overview Background Intelligence at the Edge Samsung Research Learning at the Edge: Challenges and Brainstorming Amazon Alexa Smart Home! Background Ph.D. at UW CSE RFID, Mobile, Sensors, Data Nokia Research
More informationApplied Statistics for Neuroscientists Part IIa: Machine Learning
Applied Statistics for Neuroscientists Part IIa: Machine Learning Dr. Seyed-Ahmad Ahmadi 04.04.2017 16.11.2017 Outline Machine Learning Difference between statistics and machine learning Modeling the problem
More informationStar rating driver safety behavior by the use of smart technologies
RoundTable Use of technology and its impact on road safety New York, June 14, 2016 Star rating driver safety behavior by the use of smart technologies George Yannis, Professor National Technical University
More informationMobile Ad Hoc Networks: Basic Concepts and Research Issues
Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full
More informationPARALLEL CLASSIFICATION ALGORITHMS
PARALLEL CLASSIFICATION ALGORITHMS By: Faiz Quraishi Riti Sharma 9 th May, 2013 OVERVIEW Introduction Types of Classification Linear Classification Support Vector Machines Parallel SVM Approach Decision
More informationCOMP90049 Knowledge Technologies
COMP90049 Knowledge Technologies Data Mining (Lecture Set 3) 2017 Rao Kotagiri Department of Computing and Information Systems The Melbourne School of Engineering Some of slides are derived from Prof Vipin
More informationDepartment of Computer Science & Engineering University of Kalyani. Syllabus for Ph.D. Coursework
Department of Computer Science & Engineering University of Kalyani Syllabus for Ph.D. Coursework Paper 1: A) Literature Review: (Marks - 25) B) Research Methodology: (Marks - 25) Paper 2: Computer Applications:
More informationEfficient Method for Intrusion Detection in Multitenanat Data Center; A Review
Efficient Method for Intrusion Detection in Multitenanat Data Center; A Review S. M. Jawahire Dept. of Computer Engineering J.S.C.O.E.,Hadapsar Pune, India H. A. Hingoliwala Dept. of Computer Engineering
More informationPublic Sensing Using Your Mobile Phone for Crowd Sourcing
Institute of Parallel and Distributed Systems () Universitätsstraße 38 D-70569 Stuttgart Public Sensing Using Your Mobile Phone for Crowd Sourcing 55th Photogrammetric Week September 10, 2015 Stuttgart,
More informationObject perception by primates
Object perception by primates How does the visual system put together the fragments to form meaningful objects? The Gestalt approach The whole differs from the sum of its parts and is a result of perceptual
More informationCluster analysis of 3D seismic data for oil and gas exploration
Data Mining VII: Data, Text and Web Mining and their Business Applications 63 Cluster analysis of 3D seismic data for oil and gas exploration D. R. S. Moraes, R. P. Espíndola, A. G. Evsukoff & N. F. F.
More informationKEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting
KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting Never Stand Still Faculty of Engineering Computer Science and Engineering Weitao Xu 2,3, Guohao Lan 1,3, Qi
More informationWhy? SenseML 2014 Keynote. Immanuel Schweizer
Why? SenseML 2014 Keynote Immanuel Schweizer Background Immanuel Schweizer TU Darmstadt, Germany Telecooperation Lab Ubiquitous Computing Smart Urban Networks SenseML 2014 2 Background Graph-based optimization
More informationHybrid Models Using Unsupervised Clustering for Prediction of Customer Churn
Hybrid Models Using Unsupervised Clustering for Prediction of Customer Churn Indranil Bose and Xi Chen Abstract In this paper, we use two-stage hybrid models consisting of unsupervised clustering techniques
More informationMeasuring the Capability of Smartphones for Executing Context Algorithms
Maximilian Eibl, Martin Gaedke. (Hrsg.): INFORMATIK 2017, Lecture Lecture Notes in Notes Informatics in Informatics (LNI), Gesellschaft (LNI), Gesellschaft für Informatik, für Informatik, Bonn 2017 Bonn
More informationAssociative Cellular Learning Automata and its Applications
Associative Cellular Learning Automata and its Applications Meysam Ahangaran and Nasrin Taghizadeh and Hamid Beigy Department of Computer Engineering, Sharif University of Technology, Tehran, Iran ahangaran@iust.ac.ir,
More informationLocation-Based Services & Route Planning
Praktikum Mobile und Verteilte Systeme Location-Based Services & Route Planning Prof. Dr. Claudia Linnhoff-Popien André Ebert, Sebastian Feld http://www.mobile.ifi.lmu.de WS 2017/18 Praktikum Mobile und
More informationPersonal Trusted Device in Personal Communications
Personal Trusted Device in Personal Communications Jari Porras, Pekka Jäppinen, Petri Hiirsalmi, Arto Hämäläinen, Sami Saalasti, Raine Koponen and Satu Keski-Jaskari Laboratory of Communications Engineering
More informationAdaptive Spatiotemporal Node Selection in Dynamic Networks
Adaptive Spatiotemporal Node Selection in Dynamic Networks Pradip Hari, John B. P. McCabe, Jonathan Banafato, Marcus Henry, Ulrich Kremer, Dept. of Computer Science, Rutgers University Kevin Ko, Emmanouil
More informationTizen apps with. Context Awareness, powered by AI. by Shashwat Pradhan, CEO Emberify
Tizen apps with 1 Context Awareness, powered by AI by Shashwat Pradhan, CEO Emberify Introduction Context refers to information that characterizes a situation, between: Apps People Surrounding environment
More informationData mining with sparse grids
Data mining with sparse grids Jochen Garcke and Michael Griebel Institut für Angewandte Mathematik Universität Bonn Data mining with sparse grids p.1/40 Overview What is Data mining? Regularization networks
More informationApplying Supervised Learning
Applying Supervised Learning When to Consider Supervised Learning A supervised learning algorithm takes a known set of input data (the training set) and known responses to the data (output), and trains
More informationTable Of Contents: xix Foreword to Second Edition
Data Mining : Concepts and Techniques Table Of Contents: Foreword xix Foreword to Second Edition xxi Preface xxiii Acknowledgments xxxi About the Authors xxxv Chapter 1 Introduction 1 (38) 1.1 Why Data
More informationMOBILE COMPUTING (Common to Computer Science & Engineering and Information Technology)
Code No: R41054 R10 Set No. 1 1 a) Explain functional architecture of GSM. [8] b) Write and explain novel applications of Mobile Computing. [7] 2 a) Explain in detail about IEEE 802.11 MAC Data frames.
More information3D Hand Pose Estimation with Neural Networks
3D Hand Pose Estimation with Neural Networks Jose Antonio Serra 1, Jose Garcia-Rodriguez 1, Sergios Orts 1, Juan Manuel Garcia- Chamizo 1, Anastassia Angelopoulou 2, Alexandra Psarou 2, Markos Mentzelopoulos
More informationSlides for Data Mining by I. H. Witten and E. Frank
Slides for Data Mining by I. H. Witten and E. Frank 7 Engineering the input and output Attribute selection Scheme-independent, scheme-specific Attribute discretization Unsupervised, supervised, error-
More informationBig Data Methods. Chapter 5: Machine learning. Big Data Methods, Chapter 5, Slide 1
Big Data Methods Chapter 5: Machine learning Big Data Methods, Chapter 5, Slide 1 5.1 Introduction to machine learning What is machine learning? Concerned with the study and development of algorithms that
More informationCSIS. Pattern Recognition. Prof. Sung-Hyuk Cha Fall of School of Computer Science & Information Systems. Artificial Intelligence CSIS
Pattern Recognition Prof. Sung-Hyuk Cha Fall of 2002 School of Computer Science & Information Systems Artificial Intelligence 1 Perception Lena & Computer vision 2 Machine Vision Pattern Recognition Applications
More informationMachine Learning Techniques for Data Mining
Machine Learning Techniques for Data Mining Eibe Frank University of Waikato New Zealand 10/25/2000 1 PART VII Moving on: Engineering the input and output 10/25/2000 2 Applying a learner is not all Already
More informationAutoorganised Structures for Extraction of Perceptual Primitives
Autoorganised Structures for Extraction of Perceptual Primitives M. Penas, M.G.Penedo Dept. Computer Science Univ. of A Coruña, SPAIN M.J.Carreira Dept. Electronics and Computer Science Univ. of Santiago
More informationStability Assessment of Electric Power Systems using Growing Neural Gas and Self-Organizing Maps
Stability Assessment of Electric Power Systems using Growing Gas and Self-Organizing Maps Christian Rehtanz, Carsten Leder University of Dortmund, 44221 Dortmund, Germany Abstract. Liberalized competitive
More informationData: a collection of numbers or facts that require further processing before they are meaningful
Digital Image Classification Data vs. Information Data: a collection of numbers or facts that require further processing before they are meaningful Information: Derived knowledge from raw data. Something
More informationProfiles and Context Awareness for Mobile Users a Middleware Approach supporting Personal Security.
Profiles and Context Awareness for Mobile Users a Middleware Approach supporting Personal Security. Security of Pervasive Communication, SPC 06 T-Systems Enterprise Services GmbH Technologiezentrum ENPS
More informationMachine Learning Chapter 2. Input
Machine Learning Chapter 2. Input 2 Input: Concepts, instances, attributes Terminology What s a concept? Classification, association, clustering, numeric prediction What s in an example? Relations, flat
More informationLecture 6: Unsupervised Machine Learning Dagmar Gromann International Center For Computational Logic
SEMANTIC COMPUTING Lecture 6: Unsupervised Machine Learning Dagmar Gromann International Center For Computational Logic TU Dresden, 23 November 2018 Overview Unsupervised Machine Learning overview Association
More informationData Mining Practical Machine Learning Tools and Techniques
Input: Concepts, instances, attributes Data ining Practical achine Learning Tools and Techniques Slides for Chapter 2 of Data ining by I. H. Witten and E. rank Terminology What s a concept z Classification,
More informationPedestrian Detection with Radar and Computer Vision
Pedestrian Detection with Radar and Computer Vision camera radar sensor Stefan Milch, Marc Behrens, Darmstadt, September 25 25 / 26, 2001 Pedestrian accidents and protection systems Impact zone: 10% opposite
More informationThe Role of a Context Service in a System that aims at integrating the Digital with the Real World
The Role of a Context Service in a System that aims at integrating the Digital with the Real World Dagstuhl Seminar Ubiquitous Computing, 09.09.2001 Fritz Hohl (hohl@sony.de) Telecommunication Research
More informationImage Processing, Analysis and Machine Vision
Image Processing, Analysis and Machine Vision Milan Sonka PhD University of Iowa Iowa City, USA Vaclav Hlavac PhD Czech Technical University Prague, Czech Republic and Roger Boyle DPhil, MBCS, CEng University
More informationImage Mining: frameworks and techniques
Image Mining: frameworks and techniques Madhumathi.k 1, Dr.Antony Selvadoss Thanamani 2 M.Phil, Department of computer science, NGM College, Pollachi, Coimbatore, India 1 HOD Department of Computer Science,
More informationMachine Learning for the Quantified Self. Lecture 2 Basic of Sensory Data
Machine Learning for the Quantified Self Lecture 2 Basic of Sensory Data Dataset (1) During the course we will use a running example provided by CrowdSignals.io People share their mobile sensors data (smart
More informationRobot Learning. There are generally three types of robot learning: Learning from data. Learning by demonstration. Reinforcement learning
Robot Learning 1 General Pipeline 1. Data acquisition (e.g., from 3D sensors) 2. Feature extraction and representation construction 3. Robot learning: e.g., classification (recognition) or clustering (knowledge
More informationProviding Information Superiority to Small Tactical Units
Providing Information Superiority to Small Tactical Units Jeff Boleng, PhD Principal Member of the Technical Staff Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon
More informationFigure 1: Workflow of object-based classification
Technical Specifications Object Analyst Object Analyst is an add-on package for Geomatica that provides tools for segmentation, classification, and feature extraction. Object Analyst includes an all-in-one
More informationActivity Recognition Using Cell Phone Accelerometers
Activity Recognition Using Cell Phone Accelerometers Jennifer Kwapisz, Gary Weiss, Samuel Moore Department of Computer & Info. Science Fordham University 1 We are Interested in WISDM WISDM: WIreless Sensor
More informationContext Awareness for Group Interaction Support
Context Awareness for Group Interaction Support Alois Ferscha, Clemens Holzmann, Stefan Oppl Institut für Pervasive Computing, Johannes Kepler Universität Linz Altenbergerstraße 69, A-4040 Linz {ferscha,holzmann,oppl}@soft.uni-linz.ac.at
More informationDiscovery of Agricultural Patterns Using Parallel Hybrid Clustering Paradigm
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 PP 10-15 www.iosrjen.org Discovery of Agricultural Patterns Using Parallel Hybrid Clustering Paradigm P.Arun, M.Phil, Dr.A.Senthilkumar
More informationModeling Context-Aware Behavior by Interpreted ECA Rules
Modeling Context-Aware Behavior by Interpreted ECA Rules Wolfgang Beer 1, Volker Christian 1, Alois Ferscha 1, and Lars Mehrmann 2 1 Johannes Kepler University Linz, Department for Practical Informatics,
More informationTreeGNG - Hierarchical Topological Clustering
TreeGNG - Hierarchical Topological lustering K..J.Doherty,.G.dams, N.Davey Department of omputer Science, University of Hertfordshire, Hatfield, Hertfordshire, L10 9, United Kingdom {K..J.Doherty,.G.dams,
More informationEnhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques
24 Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques Ruxandra PETRE
More informationObservations and Measurements
Observations and Measurements issues and upgrades Simon Cox CSIRO Exploration & Mining http://www.em.csiro.au Goal of Observations and Measurements Information model for Sensor Web Enablement consistent
More informationCS 556: Computer Vision. Lecture 18
CS 556: Computer Vision Lecture 18 Prof. Sinisa Todorovic sinisa@eecs.oregonstate.edu 1 Color 2 Perception of Color The sensation of color is caused by the brain Strongly affected by: Other nearby colors
More informationData Mining. Practical Machine Learning Tools and Techniques. Slides for Chapter 3 of Data Mining by I. H. Witten, E. Frank and M. A.
Data Mining Practical Machine Learning Tools and Techniques Slides for Chapter 3 of Data Mining by I. H. Witten, E. Frank and M. A. Hall Input: Concepts, instances, attributes Terminology What s a concept?
More informationNexus A Global, Active,
Nexus A Global, Active, and 3D Augmented Reality Model Institute for Parallel and Distributed Systems Universität ität Stuttgarttt t Overview Nexus A Global, Active, and 3D Augmented Reality Model Introduction:
More informationMining di Dati Web. Lezione 3 - Clustering and Classification
Mining di Dati Web Lezione 3 - Clustering and Classification Introduction Clustering and classification are both learning techniques They learn functions describing data Clustering is also known as Unsupervised
More informationSemi-Supervised Clustering with Partial Background Information
Semi-Supervised Clustering with Partial Background Information Jing Gao Pang-Ning Tan Haibin Cheng Abstract Incorporating background knowledge into unsupervised clustering algorithms has been the subject
More informationIntroduction to Data Mining and Data Analytics
1/28/2016 MIST.7060 Data Analytics 1 Introduction to Data Mining and Data Analytics What Are Data Mining and Data Analytics? Data mining is the process of discovering hidden patterns in data, where Patterns
More informationTopics in AI (CPSC 532L): Multimodal Learning with Vision, Language and Sound. Lecture 12: Deep Reinforcement Learning
Topics in AI (CPSC 532L): Multimodal Learning with Vision, Language and Sound Lecture 12: Deep Reinforcement Learning Types of Learning Supervised training Learning from the teacher Training data includes
More informationSwarm at the Edge of the Cloud. John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013
Slide 1 John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013 Disclaimer: I m not talking about the run- of- the- mill Internet of Things When people talk about the IoT, they often seem to be talking
More informationDiver Telemetry Wireless Groundwater & Surface Water Data Transmission
Telemetry Wireless Groundwater & Surface Water Data Transmission Maximize data quality Reduce operating costs Near real-time insight -NETZ CONTROL 3 YOUR DATA IN STEPS Introduction -NETZ is a complete
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Having looked at the individual nodes in the previous chapter,
More informationCareers in Smart Technologies Jamie McCormick September 17 th, 18 th & 19 th
Careers in Smart Technologies Jamie McCormick September 17 th, 18 th & 19 th 2014 Who I am Worked in the Irish Games Industry for 14 years Began games career during 4 th year (1998-1999) running games
More informationA Review on Cluster Based Approach in Data Mining
A Review on Cluster Based Approach in Data Mining M. Vijaya Maheswari PhD Research Scholar, Department of Computer Science Karpagam University Coimbatore, Tamilnadu,India Dr T. Christopher Assistant professor,
More informationEvent: PASS SQL Saturday - DC 2018 Presenter: Jon Tupitza, CTO Architect
Event: PASS SQL Saturday - DC 2018 Presenter: Jon Tupitza, CTO Architect BEOP.CTO.TP4 Owner: OCTO Revision: 0001 Approved by: JAT Effective: 08/30/2018 Buchanan & Edwards Proprietary: Printed copies of
More informationAn Analysis of the Usage of Mobile Phones for Personalized Interactions with Ubiquitous Public Displays
An Analysis of the Usage of Mobile Phones for Personalized Interactions with Ubiquitous Public Displays Enrico Rukzio, Albrecht Schmidt, Heinrich Hussmann Media Informatics Institute for Computer Science
More information